Home > Resource Center > Events > Special ASCDI podcast focuses on data destruction trends for IT stakeholders and suppliers
Special ASCDI podcast focuses on data destruction trends for IT stakeholders and suppliers

Special ASCDI podcast focuses on data destruction trends for IT stakeholders and suppliers

Posted in Events

Glenn Laga

March 9, 2021

ASCDI (Association of Service, Communications, Data and ITAD Providers) recently interviewed Glenn Laga, Guardian Data Destruction President and Founder, to tease out trends in the post-COVID IT device marketplace. As a non-competitive subcontractor with 23 locations in the US, Guardian works with VARS, ITADs, resellers and brokers to complement their core services while ensuring that all end-of-life data and security projects are in compliance. Guardian specializes in all aspects of onsite data destruction, with extendable services including packing, shipping, logistics and enterprise options such as data center decommissioning and lift and shift.

Whether it’s customer concerns about data security or how move sensitive devices from A to B, Guardian responds with a service-oriented, single-source solution. “Our focus is on developing and maintaining long and successful relationships with our channel partners by consistently providing the best in onsite data destruction services,” summarized Glenn, “We’re thrilled to be working with the ASCDI members and offering them additional services to keep their clients in compliance and coming back.”

Listen to the ASCDI “Data Destruction is the service everyone in the IT world should be thinking about” podcast here.

Ready to get started?

Get a quote > Discuss your challenge >

ITAD Summit 2022: The Hot Topics You May Have Missed

ITAD Summit 2022 was a pleasure. The Florida July weather was (surprisingly) cooler than New Jersey, the hosting Seminole Hard Rock Hotel was gorgeous with …

ITAD Summit 2022: The Hot Topics You May Have Missed Keep Reading >

Keep Reading >

Asset Checklist for your IT Risk Management Plan

IT risk management strategies are focused on security breach prevention. That’s a big mandate. In addition to hacking and cybercrime prevention, information technology departments need …

Asset Checklist for your IT Risk Management Plan Keep Reading >

Keep Reading >

How IT Asset Managers can Prevent Data Breaches (a recorded IAITAM 2022 session)

Data storage and sharing are increasing so rapidly and changing so quickly that keeping up with “what’s being stored where” is complicating in-place processes developed …

How IT Asset Managers can Prevent Data Breaches (a recorded IAITAM 2022 session) Keep Reading >

Keep Reading >

Stay in the know

Get relevant information right in your inbox

We do not sell or share your information with anyone

Previous Next
Close
Test Caption
Test Description goes like this